SlideShare a Scribd company logo
4
Most read
5
Most read
7
Most read
© Copyright 2017 NETMONASTERY Inc
Big Data Structures in the Cyber Security Puzzle
1
Shomiron DAS GUPTA, Founder, CEO
NETMONASTERY Inc.
Data Analytics in
Cyber Security
© Copyright 2017 NETMONASTERY Inc
Agenda … Setting Expectations!
2
NEXT 45 MINS
1. Cyber Security - How it works, today!
2. Data Analytics, the What and the Why
3. The Technical Aspects
4. The Pipeline
5. Opportunities - Gaps we’re aiming for
6. Demo
© Copyright 2017 NETMONASTERY Inc
Hello, who is speaking?
3
Founder of NETMONASTERY, we built DNIF - An
Integrated Threat Hunting Platform for the CSOC
Research on Detection, Hunting and …. ML
One of the few guys that does defense for a
living
GCIA 2000 - 18Yrs of Intrusion Detection,
Handling
WHAT I DO FOR A LIVING
@shomiron
© Copyright 2017 NETMONASTERY Inc
Cyber Security — The NUMBERS!
4
THE CURRENT WORLD CHALLENGES
■ Data growth 230% YoY
■ Mid Sized Enterprise - 30 TB Monthly
■ Enterprise Grade - 100+ TB Monthly
■ Government - 1.23 PB Monthly
■ Process, Percolation / Lag < 10s
■ Detect stuff we didn’t know about
© Copyright 2017 NETMONASTERY Inc
Cyber Security Solutions — Where were we?
5
THE CURRENT WORLD
Security Information and Event Management
■ It’s… last generation
■ Slow… can’t scale (database)
■ Rule based - KNOWN / KNOWNs
■ Beautiful UI - HiFi
■ Center of the Earth
© Copyright 2017 NETMONASTERY Inc
6
We FAIL*
EVERYDAY!!
© Copyright 2017 NETMONASTERY Inc
Data Analytics + Big Data Structures
7
AND THE MARRIAGE PARTY
1. Facets and dimensionality
2. Static / dynamic analytics
3. Why static is better
4. Then why are we doing dynamic?
5. The Marriage of Big Data with Analytics
6. Hadoop…. anybody?
© Copyright 2017 NETMONASTERY Inc
Technical Aspects
8
HOW IT WORKS
1. Horizontal scaling - Speed
2. Pipeline, let’s revisit Hadoop?
3. Data preparation - Parsing / Annotation
4. Enrichment - localization for context
5. Plugin framework - SOAR - Enrich, Validate, Respond
6. AI / ML ;)
7. Platform + Content
© Copyright 2017 NETMONASTERY Inc
9
The PIPELINE
DATA FLOW WITHIN
COLLECT PARSE ANNOTATE ENRICH
VISUALIZE CORRELATE
INDEX
VALIDATE RESPOND REMEDIATE
© Copyright 2017 NETMONASTERY Inc
10
The PIPELINE
DATA FLOW WITHIN
ADAPTER
DATASTORE
CORRELATOR
© Copyright 2017 NETMONASTERY Inc
Talking about DNIF
11
AND COMPETITION
1. SIEM - ArcSight, QRadar
2. Splunk, ELK
3. Hadoop (Cloudera, Hortonworks), Tableau, HANA, Watson
4. Free Parsers, SOAR, Packages / Plugins
5. Power of Collaboration
© Copyright 2017 NETMONASTERY Inc
Opportunities - Gaps we’re aiming for
12
THE BUSINESS ANGLE, YAY!
1. Managed Security Services
2. Threat Hunting
3. Managed Detection Response
4. SWIFT, IMPS, NEFT, CC, Exchange, Telecom Switching
5. The Data Lake Theory - WORKBENCH
Thank You
Oh BTW We are hiring
Write to us - hello@dnif.it
13

More Related Content

PPTX
Understanding cyber resilience
PPTX
AI and ML in Cybersecurity
PPTX
Artificial Intelligence and Cybersecurity
PDF
IBM Qradar
PDF
GENERATIVE AI, THE FUTURE OF PRODUCTIVITY
PPSX
Next-Gen security operation center
PPTX
Cyber attacks and IT security management in 2025
PPTX
AI and the Impact on Cybersecurity
Understanding cyber resilience
AI and ML in Cybersecurity
Artificial Intelligence and Cybersecurity
IBM Qradar
GENERATIVE AI, THE FUTURE OF PRODUCTIVITY
Next-Gen security operation center
Cyber attacks and IT security management in 2025
AI and the Impact on Cybersecurity

What's hot (20)

PDF
Cyber security career development paths
PDF
Security Automation and Machine Learning
PDF
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
PPTX
Crowdstrike .pptx
PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
PPTX
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
PDF
Mapping ATT&CK Techniques to ENGAGE Activities
PDF
Cybersecurity Roadmap Development for Executives
PDF
Cyber Resilience
PPTX
How is ai important to the future of cyber security
PPTX
Use of Artificial Intelligence in Cyber Security - Avantika University
PDF
AI: The New Player in Cybersecurity (Nov. 08, 2023)
PDF
Cyber Threat Intelligence
PDF
SIEM Architecture
PDF
Combating Cyber Security Using Artificial Intelligence
PDF
Elastic Security Brochure
PDF
Secure Your Data with Fidelis Network® for DLP
PDF
Zero Trust : How to Get Started
PPTX
Generative AI, WiDS 2023.pptx
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Cyber security career development paths
Security Automation and Machine Learning
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Crowdstrike .pptx
AI & ML in Cyber Security - Why Algorithms are Dangerous
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Mapping ATT&CK Techniques to ENGAGE Activities
Cybersecurity Roadmap Development for Executives
Cyber Resilience
How is ai important to the future of cyber security
Use of Artificial Intelligence in Cyber Security - Avantika University
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Cyber Threat Intelligence
SIEM Architecture
Combating Cyber Security Using Artificial Intelligence
Elastic Security Brochure
Secure Your Data with Fidelis Network® for DLP
Zero Trust : How to Get Started
Generative AI, WiDS 2023.pptx
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Ad

Similar to Data Analytics in Cyber Security (20)

PPTX
Big Data Impacts on Hybrid Infrastructure and Management
PPTX
Mastering Next Gen SIEM Use Cases (Part 3)
PDF
Mastering next gen-siem-usecases-part1
PPTX
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
PDF
IOT_MODULE_4.pd easy to understand notes
PPTX
Big Data Presentation - Data Center Dynamics Sydney 2014 - Dez Blanchfield
PDF
The Rise of Big Data and the Chief Data Officer (CDO)
PPTX
Big data analytics and machine intelligence v5.0
PDF
Big Data Science Workshop Documentation V1.0
PPTX
Big Data Expo 2015 - IBM 5 predictions
PDF
SuanIct-Bigdata desktop-final
PDF
Workshop on Data Science at Best Practices Meet 2017, Data Security Council o...
PDF
Aioug big data and hadoop
PPTX
Big Data and Semantic Web in Manufacturing
PDF
History of Data-Centric Transformation
PPT
Óscar Méndez - Big data: de la investigación científica a la gestión empresarial
PPTX
Cloud Revolution Conitnues
PPTX
Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014
PPTX
Intro big data analytics
PDF
Random notes on big data
Big Data Impacts on Hybrid Infrastructure and Management
Mastering Next Gen SIEM Use Cases (Part 3)
Mastering next gen-siem-usecases-part1
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
IOT_MODULE_4.pd easy to understand notes
Big Data Presentation - Data Center Dynamics Sydney 2014 - Dez Blanchfield
The Rise of Big Data and the Chief Data Officer (CDO)
Big data analytics and machine intelligence v5.0
Big Data Science Workshop Documentation V1.0
Big Data Expo 2015 - IBM 5 predictions
SuanIct-Bigdata desktop-final
Workshop on Data Science at Best Practices Meet 2017, Data Security Council o...
Aioug big data and hadoop
Big Data and Semantic Web in Manufacturing
History of Data-Centric Transformation
Óscar Méndez - Big data: de la investigación científica a la gestión empresarial
Cloud Revolution Conitnues
Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014
Intro big data analytics
Random notes on big data
Ad

More from DNIF (15)

PPTX
Beyond blacklists - A cyber threat intelligence perspective
PPTX
Insight into SOAR
PPTX
A closer look at CTF challenges
PDF
Threat Intelligence and Cyber Security Challenges | KASPERSKY & DNIF INTEGRATION
PPTX
CVE Analysis using vFeed
PDF
Container Security Essentials
PDF
Importance of having a vulnerability management | Vfeed
PPTX
Anatomy of Persistence Techniques & Strategies to Detect
PPTX
User Behavior Analytics Using Machine Learning
PPTX
Process Whitelisting With VirusTotal
PPTX
VirusTotal Threat Intelligence and DNIF Use Cases
PPTX
Threat hunting and achieving security maturity
PPTX
Kaspersky Threat Intelligence Portal and DNIF Use Cases
PPTX
Mastering Next Gen SIEM Use Cases (Part 2)
PPTX
Mastering Next Gen SIEM Use Cases (Part 1)
Beyond blacklists - A cyber threat intelligence perspective
Insight into SOAR
A closer look at CTF challenges
Threat Intelligence and Cyber Security Challenges | KASPERSKY & DNIF INTEGRATION
CVE Analysis using vFeed
Container Security Essentials
Importance of having a vulnerability management | Vfeed
Anatomy of Persistence Techniques & Strategies to Detect
User Behavior Analytics Using Machine Learning
Process Whitelisting With VirusTotal
VirusTotal Threat Intelligence and DNIF Use Cases
Threat hunting and achieving security maturity
Kaspersky Threat Intelligence Portal and DNIF Use Cases
Mastering Next Gen SIEM Use Cases (Part 2)
Mastering Next Gen SIEM Use Cases (Part 1)

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Mushroom cultivation and it's methods.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Getting Started with Data Integration: FME Form 101
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Heart disease approach using modified random forest and particle swarm optimi...
TLE Review Electricity (Electricity).pptx
Network Security Unit 5.pdf for BCA BBA.
MIND Revenue Release Quarter 2 2025 Press Release
cloud_computing_Infrastucture_as_cloud_p
Mushroom cultivation and it's methods.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25-Week II
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Getting Started with Data Integration: FME Form 101
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A comparative study of natural language inference in Swahili using monolingua...
Unlocking AI with Model Context Protocol (MCP)
Group 1 Presentation -Planning and Decision Making .pptx
SOPHOS-XG Firewall Administrator PPT.pptx

Data Analytics in Cyber Security

  • 1. © Copyright 2017 NETMONASTERY Inc Big Data Structures in the Cyber Security Puzzle 1 Shomiron DAS GUPTA, Founder, CEO NETMONASTERY Inc. Data Analytics in Cyber Security
  • 2. © Copyright 2017 NETMONASTERY Inc Agenda … Setting Expectations! 2 NEXT 45 MINS 1. Cyber Security - How it works, today! 2. Data Analytics, the What and the Why 3. The Technical Aspects 4. The Pipeline 5. Opportunities - Gaps we’re aiming for 6. Demo
  • 3. © Copyright 2017 NETMONASTERY Inc Hello, who is speaking? 3 Founder of NETMONASTERY, we built DNIF - An Integrated Threat Hunting Platform for the CSOC Research on Detection, Hunting and …. ML One of the few guys that does defense for a living GCIA 2000 - 18Yrs of Intrusion Detection, Handling WHAT I DO FOR A LIVING @shomiron
  • 4. © Copyright 2017 NETMONASTERY Inc Cyber Security — The NUMBERS! 4 THE CURRENT WORLD CHALLENGES ■ Data growth 230% YoY ■ Mid Sized Enterprise - 30 TB Monthly ■ Enterprise Grade - 100+ TB Monthly ■ Government - 1.23 PB Monthly ■ Process, Percolation / Lag < 10s ■ Detect stuff we didn’t know about
  • 5. © Copyright 2017 NETMONASTERY Inc Cyber Security Solutions — Where were we? 5 THE CURRENT WORLD Security Information and Event Management ■ It’s… last generation ■ Slow… can’t scale (database) ■ Rule based - KNOWN / KNOWNs ■ Beautiful UI - HiFi ■ Center of the Earth
  • 6. © Copyright 2017 NETMONASTERY Inc 6 We FAIL* EVERYDAY!!
  • 7. © Copyright 2017 NETMONASTERY Inc Data Analytics + Big Data Structures 7 AND THE MARRIAGE PARTY 1. Facets and dimensionality 2. Static / dynamic analytics 3. Why static is better 4. Then why are we doing dynamic? 5. The Marriage of Big Data with Analytics 6. Hadoop…. anybody?
  • 8. © Copyright 2017 NETMONASTERY Inc Technical Aspects 8 HOW IT WORKS 1. Horizontal scaling - Speed 2. Pipeline, let’s revisit Hadoop? 3. Data preparation - Parsing / Annotation 4. Enrichment - localization for context 5. Plugin framework - SOAR - Enrich, Validate, Respond 6. AI / ML ;) 7. Platform + Content
  • 9. © Copyright 2017 NETMONASTERY Inc 9 The PIPELINE DATA FLOW WITHIN COLLECT PARSE ANNOTATE ENRICH VISUALIZE CORRELATE INDEX VALIDATE RESPOND REMEDIATE
  • 10. © Copyright 2017 NETMONASTERY Inc 10 The PIPELINE DATA FLOW WITHIN ADAPTER DATASTORE CORRELATOR
  • 11. © Copyright 2017 NETMONASTERY Inc Talking about DNIF 11 AND COMPETITION 1. SIEM - ArcSight, QRadar 2. Splunk, ELK 3. Hadoop (Cloudera, Hortonworks), Tableau, HANA, Watson 4. Free Parsers, SOAR, Packages / Plugins 5. Power of Collaboration
  • 12. © Copyright 2017 NETMONASTERY Inc Opportunities - Gaps we’re aiming for 12 THE BUSINESS ANGLE, YAY! 1. Managed Security Services 2. Threat Hunting 3. Managed Detection Response 4. SWIFT, IMPS, NEFT, CC, Exchange, Telecom Switching 5. The Data Lake Theory - WORKBENCH
  • 13. Thank You Oh BTW We are hiring Write to us - hello@dnif.it 13